ANALYTICS-ENHANCED THREAT INTEL: MAKING FEEDS WORK FOR YOU – PART 3

ANALYTICS-ENHANCED THREAT INTEL: MAKING FEEDS WORK FOR YOU – PART 3

This is part 3 of our blog series, “Are your threat intelligence feeds saving you, or costing you?”. Part 1 covered gathering…

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 2

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 2

This is Part 2 of our blog series, “Analytics-Enhanced Threat Intel: Making Feeds Work For You.” Part 1 focused on gathering threat…

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 1

Analytics-Enhanced Threat Intel: Making Feeds Work For You – Part 1

This is the Part 1 of our blog series, “Analytics-Enhanced Threat Intel: Making Feeds Work For You.” Threat intelligence feeds are key…

SIGNIFICANT DATA BREACHES – APRIL 2015

SIGNIFICANT DATA BREACHES – APRIL 2015

IKANOW’s major breach index along with a recap of the major data breaches that took place in April 2015 are listed below.…

Cyber Threat Analytics versus Threat Intelligence

Cyber Threat Analytics versus Threat Intelligence

We have discussions daily with customers, partners, and prospects about cyber security solutions and it’s not uncommon to hear questions like “What is…

A SIEM is not enough: moving to a complete cyber security solution

A SIEM is not enough: moving to a complete cyber security solution

Today’s chief information officers (CIOs) receive enormous amounts of security data, and they need every bit. A steady stream of data from…

5 Signs That Your Business Needs Cyber Threat Analytics Now

5 Signs That Your Business Needs Cyber Threat Analytics Now

Most security teams work hard to collect cyber threat information, and they want to develop quick and effective incident responses. Unfortunately, information…

Significant Data Breaches – March 2015

Significant Data Breaches – March 2015

IKANOW’s recap of the major data breaches that took place in March 2015 are listed below. ASML – Malicious Outsider ASML, the world’s largest…

Significant Data Breaches – February 2015

Significant Data Breaches – February 2015

It seems that each week we read about a new attack on a major enterprise or government agency. February was no different. Below…

New eBook: “Beyond the Kill Chain”

New eBook: “Beyond the Kill Chain”

The Kill Chain can play an important part of any organization or agency’s cyber defenses however it’s a very reactive approach. In our…

123